Patent application number | Description | Published |
20090003314 | Systems and Methods For Verification of IP Device Location - This application discloses systems and methods for associating the geographic location of VoIP devices and monitoring and updating these locations such that emergency personnel can be directed to a caller's location based on the stored geographic-location information. | 01-01-2009 |
20090158443 | PIRACY PREVENTION, DETECTION, AND CONTENT MANAGEMENT - A computing device is configured to receive media content and determine if the received media content includes a stego message. If the media content includes a stego message, then the computing device is further configured to decode at least a portion of the stego message, and perform a task based in part on the decoded portion of the stego message. | 06-18-2009 |
20090293126 | MALWARE DETECTION DEVICE - An exemplary malware detection device includes a data pathway provided between a first data transfer device and a second data transfer device and a processor attached to the data pathway. A memory accessible by the processor contains at least one malware signature and instructions for controlling the processor to interconnect the first and second data transfer devices, direct at least a portion of a data transfer across the data pathway to the processor for analysis, independently analyze the portion of the data transfer using the malware signature, identify malware contained in the portion of the data transfer, and interrupt the data transfer based on the identification of malware. | 11-26-2009 |
20100043047 | UNAUTHORIZED DATA TRANSFER DETECTION AND PREVENTION - A method includes receiving a policy via a network connection, wherein the policy includes at least one signature. Receiving a data communication message from a processor of a computing device via a system bus. Identifying a class, and selectively forwarding the data communication message based in part on the received policy and the identified class. | 02-18-2010 |
20100061662 | System and Methods for Recording Emergency Data - A system and method for recording emergency data during a 911 call. The emergency data recorded may be in the form of a digital image. The digital image may be of the event prompting the 911 call. The digital image may be a single image, a series of images, or streaming video. The emergency data may be received on a portable electronic device, such as a cell phone, through a digital imaging device, such as a digital camera. The emergency data may then be transmitted to a server, wherein the emergency data is stored. The emergency data may be accessed by a 911 dispatcher during a 911 call to review the image data to aid in assessing the emergency recorded in the emergency data. | 03-11-2010 |
20100094619 | AUDIO FREQUENCY REMAPPING - An exemplary system and method are directed at receiving an audio signal and process the audio signal into a remapped audio signal based on a plot profile. The plot profile may include at least one of an identified range of audio frequencies. The processing may comprise retrieving an identified range of audio frequencies from the plot profile; determining a range of impaired audio frequencies in the audio signal based on the identified range of audio frequencies; shifting the frequency of at least a portion of the impaired audio frequencies to outside of the identified range; and continuing to retrieve identified ranges of audio frequencies from the plot profile. The shifting of the impaired audio frequencies of the audio signal may be performed until no further identified ranges of audio frequencies are available for consideration. | 04-15-2010 |
20100154012 | TELEVISION BOOKMARKING WITH MULTIPLATFORM DISTRIBUTION - A system includes a content processing device in communication with a control device, the content processing device is configured to receive multi-media content from a network, and create a bookmark representing at least a portion of the multi-media content upon receiving a signal from the control device. | 06-17-2010 |
20100325140 | SYSTEM FOR AND METHOD OF PARALLEL SEARCHING - A system for and method of parallel searching is presented. According to an embodiment, the techniques may be realized as a method, comprising receiving, at a network device, an indication of an electronic media selection from a user, identifying a search input in metadata associated with the electronic media selection, searching one or more electronic data sources based at least in part on the identified search input, and providing one or more search results via a network to one or more devices accessible to the user, wherein the one or more search results are capable of being delivered during delivery of the electronic media selection to the user. | 12-23-2010 |
20110016485 | DOUBLE-CLICK CHANNEL BUTTON ACCESS OF USER-DEFINED CONTENT LIST - A set-top box receives a channel input from a remote control associated with a user, and determines whether the channel input is a double-click channel input. The set-top box retrieves a user-defined content list, associated with the user, when the channel input is determined to be a double-click channel input, and tunes to a channel associated with the retrieved user-defined content list. The set-top box also receives content associated with the tuned to channel, and provides the received content to a television, where the television displays the received content to the user. | 01-20-2011 |
20110107084 | SYSTEM FOR AND METHOD FOR RELAYING MESSAGES - A system for and method of relaying messages is presented. In an exemplary embodiment, the system and method may include receiving a request from a user to transmit a message to an intended recipient, processing the message for transmission, wherein processing the message comprises assigning metadata to the message, and transmitting the message with the metadata to the intended recipient, where transmitting the message with metadata comprises searching for at least one proximate ad hoc relay device in the event that a communication link cannot be established with a communication network. | 05-05-2011 |
20110135075 | METHOD AND SYSTEM FOR PROVIDING CALLER IDENTIFICATION BASED MESSAGING SERVICES - An approach provides caller identification-based messaging services. A user-defined message associated with a directory address of a communication device is received. The user-defined message is inserted into a caller identification field of a caller identification message. Establishment of a communication session is initiated with the communication device. The caller identification message is transmitted to the communication device for presentation of the user-defined message during establishment of the communication session. | 06-09-2011 |
20110289564 | SYSTEM AND METHOD FOR PROVIDING AUTHENTICATION CONTINUITY - A computer-implemented method may include receiving first monitored information relating to a user at a time of initial user authentication with a particular application or resource. It may be determined that a second authentication is required at a second time subsequent to the time of initial user authentication. Second monitored information may be captured at the second time. The second monitored information may be compared to the first monitored information to determine whether continued authentication is maintained. Access to the particular application or resource when it is determined that continued authentication is not maintained. | 11-24-2011 |
20120036344 | CONTEXT-SENSITIVE USER DEVICE CONTROL PROFILE - A method including receiving control profile information that controls one or more operations of a user device during an event associated with a user; generating a control profile based on the control profile information; controlling the one or more operations of the user device based on the control profile for a duration of the event; and automatically setting the user device to a previous state or a new state after the event transpires. | 02-09-2012 |
20120084857 | DEVICE SECURITY SYSTEM - A computer-implemented method may include identifying a security event condition associated with a device. One or more security rules may be identified for execution based on the device and the identified security event condition, wherein the one or more security rules define security related actions to be performed upon occurrence of the security event condition. The security related actions may be initiated by at least one processor on the device to secure the device from unauthorized use. | 04-05-2012 |
20120314077 | NETWORK SYNCHRONIZED CAMERA SETTINGS - A network device receives, from a first video camera system, position information for a first video camera at a first site and sends, to a second video camera system, position instructions for a second video camera at a second site. The position instructions are configured to locate the second video camera within the second site to correspond to a relative position of the first camera in the first site. The network device receives, from the first video camera system, a first video feed including images of the first site and receives, from the second video camera system, a second video feed including images of a subject of the second site. The network device combines the first video feed and the second video feed to generate a synchronized combined video feed that overlays the images of the subject of the second video feed in images of the first site. | 12-13-2012 |
20120322480 | CELLULAR NETWORK TRAFFIC OFFLOAD VIA LOCAL WIRELESS CONNECTIVITY - A network device receives, from a first mobile communication device via a cellular network, a message to attempt initiate the set-up of data transfer via a local wireless connectivity method. The network device determines a proximity within the cellular network of the first mobile communication device with respect to a second mobile communication device that is the target of the data transfer, and determines a geographic proximity of the first mobile communication device with respect to the second mobile communication device. The network device remotely enables, from the network device, the first mobile communication device and the second mobile communication device to transfer data between them via the local wireless connectivity method instead of via the cellular network based on the determined network proximity or geographic proximity. | 12-20-2012 |
20130155169 | METHOD AND SYSTEM FOR PROVIDING VIRTUAL CONFERENCING - An approach for providing virtual conferencing is described. A virtual conference platform receives, in real-time, images representing users of the respective mobile devices, selects a virtual environment among a plurality of virtual environments, and integrates the images into the selected virtual environment. | 06-20-2013 |
20130159476 | METHOD AND SYSTEM FOR MANAGING DEVICE PROFILES - An approach for providing cloud-based profile access is described. A profile platform receives, at a cloud-based service platform, a request for a device profile from a mobile device, wherein the device profile specifies information relating to configuration of a graphical user interface and one or more applications associated with the mobile device, determines context data for the mobile device, selects one of a plurality of device profiles based on the determined context data, and generates a control message specifying the selected device profile for configuring the mobile device. | 06-20-2013 |
20130162781 | INTER POLATED MULTICAMERA SYSTEMS - An approach for enabling users to generate an interpolated view of content based on footage captured by multiple cameras is described. An interpolation platform receives a plurality of images from a plurality of video cameras providing overlapping fields of view. A camera angle that is different from angles provided by the plurality of cameras is selected. The interpolation platform then generates an interpolated image corresponding to the selected camera angle using a portion or all of the plurality of images from the plurality of cameras. | 06-27-2013 |
20130165072 | METHOD AND APPARATUS FOR AUTHORIZING TRANSFER OF MOBILE DEVICES - An approach is presented for providing the authorized transfer of a mobile device. A platform receives a request to modify ownership status information for a mobile device, and generates in response to the request, a sale identifier based on the ownership status, wherein the sale identifier provides verification that the mobile device can be subject to a transfer of ownership, and specifies device information associated with the mobile device. | 06-27-2013 |
20130191885 | SECURE MOBILE INTERFACE ACCESS SYSTEM - A method performed by one or more server devices connected to a mobile device via a network, the mobile device being connected to an electronic device is provided that can include sending, by the one or more server devices and to the mobile device, data initiating a session between the one or more server devices and the mobile device; sending a request for information about the electronic device; receiving the requested information about the electronic device; identifying device credentials for the electronic device and communication protocols for communicating with the electronic device; providing the device credentials for the electronic device and the communication protocols for communicating with the electronic device; automatically gathering information about the electronic device from data stored on the electronic device using the communication protocols and the mobile device; and providing support to the electronic device via the mobile device. | 07-25-2013 |
20140071978 | VOICE ENERGY COLLISON BACK-OFF - A device may perform audio signal collision detection configured to receive first audio information from a first device and receive second audio information from a second device over a communications network. The device may be further configured to identify a collision of the first audio information and the second audio information, and to address the collision by adjusting at least one of an audio attenuation level and a communications latency of the second audio information responsive to identification of the collision, and store the operational parameters to an adjustment profile system. | 03-13-2014 |
20140310764 | METHOD AND APPARATUS FOR PROVIDING USER AUTHENTICATION AND IDENTIFICATION BASED ON GESTURES - An approach is provided for authenticating and/or identifying a user through gestures. A plurality of media data sets of a user performing a sequence of gestures are captured. The media data sets are analyzed to determine the sequence of gestures. Authentication of the user is performed based on the sequence of gestures. | 10-16-2014 |
20150037011 | Methods and Systems for Recovering Media Content Lost Due to a Channel Change Event - An exemplary method includes a media content recovery system 1) detecting that a DVR device is tuned to a first channel used by a media content provider to distribute a first media content program, 2) dynamically storing, in response to the detecting, first program data representative of the first media content program in a local buffer residing on the DVR device and in a recovery buffer as the first media content program is distributed by the media content provider, and 3) directing the DVR device to use the first program data stored in the local buffer to present the first media content program by way of a display while the DVR device is tuned to the first channel. Corresponding methods and systems are also disclosed. | 02-05-2015 |
20150067798 | SELECTIVE COMPLEX DATA ENTRY FROM ONE TIME PASSWORDS FOR AUTHENTICATION - A one time password (OTP) associated with a client device, and a padding rule, of a plurality of possible padding rules, associated with the client device may be determined. A padded OTP that include the OTP and additional data may be formed based on the padding rule. The padding rule may be associated with at least one of a position of the OTP within the padded OTP, a characteristic of the additional data, or a characteristic of the padded OTP. The padded OTP may be provided to the client device. A selection of a portion of the padded OTP may be received from the client device, and the client device may be authenticated when the selected portion of the padded OTP corresponds to the OTP. If the selected portion of the padded OTP does not correspond to the OTP, other actions may be performed based on the selected portion. | 03-05-2015 |
20150089607 | METHOD AND APPARATUS FOR PROVIDING USER AUTHENTICATION AND IDENTIFICATION BASED ON A ONE-TIME PASSWORD - An approach is provided for authenticating and/or identifying a user through machine-transferrable one-time password codes. A user device sends to an authentication platform a request for a one-time password for authenticating a user at a relying party device. A machine readable form of the one-time password deliverable to the relying party device over an air gap between the user device and the relying party device is determined and transmitted. The relying party device reverts the machine readable form back to the one-time password, and transmits the one-time password to the authentication platform to authenticate the user device. | 03-26-2015 |
20150089613 | METHOD AND SYSTEM FOR PROVIDING ZERO SIGN ON USER AUTHENTICATION - An approach for receiving a request for an authentication code for presentation in an authentication user interface, wherein the request is from a relying party and wherein the authentication user interface is presented by the relying party at a first device. The approach further involves transmitting the authentication code to the relying party. The approach also involves authenticating a user with respect to the relying party by determining that a second device associated with the user has read the authentication code from the authentication user interface of the first device, wherein the second device is a previously authenticated device. | 03-26-2015 |